3
Introduction Goal: Create a simple Best Practice Guidelines for Mobile Device Security Methodology: Two Pronged Approach a. Research topics related to mobile security and existing and conduct a survey to obtain user behavior patterns. b. Use gathered information to create a simpler and easier to follow guideline.

4
Background There are currently 1.2 billion mobile web users according to mobithinking.com http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats The threat of malicious attacks to mobile devices is likely to increase according to a paper on malicious software in mobile devices. http://lyle.smu.edu/~tchen/papers/mobile-malware.pd Existing guidelines are often overly specific, highly specialized, or obscure.

13
Extended Guideline Read permission requests before accepting Enable remote lock and wipe Keep up to date on information about security Do not join unknown access points Only download from trusted sources Do not leave device unattended Use our guideline!